article thumbnail

Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplace

The Last Watchdog

The top ransomware gangs have become so relentless that it’s not unusual for two or more of them to attack the same company within a few days – or even a few hours. Related: How ‘IABs’ foster ransomware. LockBit went in first and exfiltrated data and passwords, and then used PsExe to distribute their ransomware payload.

article thumbnail

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. Let’s take a look at five of the best online courses for cyber security. Certified Cyber Security Foundation Training Course.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Elearning Staff Awareness Course Overview: Ransomware

IT Governance

He also delivers ISO 27001 training courses. Damian recently updated our Ransomware Staff Awareness E-learning Course – a 30-minute, non-technical course that’s suitable for all staff. Why is this elearning course so important? Over Q4 2023, our research found that 25% of all incidents involved ransomware.

article thumbnail

Zurich refuses to pay Mondelez for NotPetya damages because it’s ‘an act of war’

Security Affairs

The US food giant Mondelez is suing Zurich for $100 Million after the insurance company rejected its claim to restore normal operations following the massive NotPetya ransomware attack. The shipping giant Maersk declared that it had lost $300 million as a result of the massive ransomware attacks.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

Can the vendor give references or case studies that show effective security deployments in similar organizations? This includes protecting diverse technological assets, such as software, hardware, devices, and cloud resources, from potential security flaws like malware, ransomware, theft, phishing assaults, and bots.

article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

But over the course of the last couple years, some really valid points have been raised about. Of course, it's a lot more difficult to do now because they have, you know, more entropy and TCP sequence numbers and all these other things, but for that day, that was really cutting edge. Well, yeah, we agree with that. on society.

IT 52
article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

As wake up calls go, the Colonial Pipeline ransomware hack was piercing. This very high-profile caper is part of an extended surge of ransomware attacks, which quintupled globally between the first quarter of 2018 and the fourth quarter of 2020, and is expected to rise 20 percent to 40 percent this year, according to insurance giant Aon.